Displaying 101 – 120 of 209

Showing per page

A short note on multivariate dependence modeling

Vladislav Bína, Radim Jiroušek (2013)

Kybernetika

As said by Mareš and Mesiar, necessity of aggregation of complex real inputs appears almost in any field dealing with observed (measured) real quantities (see the citation below). For aggregation of probability distributions Sklar designed his copulas as early as in 1959. But surprisingly, since that time only a very few literature have appeared dealing with possibility to aggregate several different pairwise dependencies into one multivariate copula. In the present paper this problem is tackled...

A simultaneous localization and tracking method for a worm tracking system

Mateusz Kowalski, Piotr Kaczmarek, Rafał Kabaciński, Mieszko Matuszczak, Kamil Tranbowicz, Robert Sobkowiak (2014)

International Journal of Applied Mathematics and Computer Science

The idea of worm tracking refers to the path analysis of Caenorhabditis elegans nematodes and is an important tool in neurobiology which helps to describe their behavior. Knowledge about nematode behavior can be applied as a model to study the physiological addiction process or other nervous system processes in animals and humans. Tracking is performed by using a special manipulator positioning a microscope with a camera over a dish with an observed individual. In the paper, the accuracy of a nematode's...

A survey of subpixel edge detection methods for images of heat-emitting metal specimens

Anna Fabijańska (2012)

International Journal of Applied Mathematics and Computer Science

In this paper the problem of accurate edge detection in images of heat-emitting specimens of metals is discussed. The images are provided by the computerized system for high temperature measurements of surface properties of metals and alloys. Subpixel edge detection is applied in the system considered in order to improve the accuracy of surface tension determination. A reconstructive method for subpixel edge detection is introduced. The method uses a Gaussian function in order to reconstruct the...

A Test for the Stability of Networks

Agnieszka Rowinska-Schwarzweller, Christoph Schwarzweller (2013)

Formalized Mathematics

A complex polynomial is called a Hurwitz polynomial, if all its roots have a real part smaller than zero. This kind of polynomial plays an all-dominant role in stability checks of electrical (analog or digital) networks. In this article we prove that a polynomial p can be shown to be Hurwitz by checking whether the rational function e(p)/o(p) can be realized as a reactance of one port, that is as an electrical impedance or admittance consisting of inductors and capacitors. Here e(p) and o(p) denote...

A tight bound for exhaustive key search attacks against Message Authentication Codes

Vinícius G. P. de SÁ, Davidson R. Boccardo, Luiz Fernando Rust, Raphael C. S. Machado (2013)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set...

A topological asymptotic analysis for the regularized grey-level image classification problem

Didier Auroux, Lamia Jaafar Belaid, Mohamed Masmoudi (2007)

ESAIM: Mathematical Modelling and Numerical Analysis

The aim of this article is to propose a new method for the grey-level image classification problem. We first present the classical variational approach without and with a regularization term in order to smooth the contours of the classified image. Then we present the general topological asymptotic analysis, and we finally introduce its application to the grey-level image classification problem.

A variational model in image processing with focal points

Andrea Braides, Giuseppe Riey (2008)

ESAIM: Mathematical Modelling and Numerical Analysis

We propose a model for segmentation problems involving an energy concentrated on the vertices of an unknown polyhedral set, where the contours of the images to be recovered have preferred directions and focal points. We prove that such an energy is obtained as a Γ-limit of functionals defined on sets with smooth boundary that involve curvature terms of the boundary. The minimizers of the limit functional are polygons with edges either parallel to some prescribed directions or pointing to some fixed...

Access structures for finding characteristic-dependent linear rank inequalities

Victor Peña-Macias (2023)

Kybernetika

Determining information ratios of access structures is an important problem in secret sharing. Information inequalities and linear rank inequalities play an important role for proving bounds on these ratios. Characteristic-dependent linear rank inequalities are rank inequalities which are true over vector spaces with specific field characteristic. In this paper, using ideas of secret sharing, we show a theorem that produces characteristic-dependent linear rank inequalities. These inequalities are...

Currently displaying 101 – 120 of 209